EP0176538A1 - Security system - Google Patents

Security system

Info

Publication number
EP0176538A1
EP0176538A1 EP85901505A EP85901505A EP0176538A1 EP 0176538 A1 EP0176538 A1 EP 0176538A1 EP 85901505 A EP85901505 A EP 85901505A EP 85901505 A EP85901505 A EP 85901505A EP 0176538 A1 EP0176538 A1 EP 0176538A1
Authority
EP
European Patent Office
Prior art keywords
data
encoded
image
optical element
optical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP85901505A
Other languages
German (de)
French (fr)
Inventor
Richard George Bingham
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB848425017A external-priority patent/GB8425017D0/en
Application filed by Individual filed Critical Individual
Publication of EP0176538A1 publication Critical patent/EP0176538A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages

Definitions

  • This invention relates to a security system and, in one particular embodiment. to security systems for protection of computer software against unauthorised access.
  • One specific application for this invention is to inhibit the running of computer programs whilst still permitting the software to be copied.
  • a further specific application of the invention is in the production of encoded documents, labels and tags which cannot be read but again, can be copied
  • United States Patent 4480179 provides an apparatus for coding and/or decoding a written document comprising a plurality of fibre-optic light paths which re-arrange the relative positions of parts of the document while the document is being photocopied.
  • the apparatus thus produces an encoded document which can be read by reversing the coding process.
  • a system to inhibit unauthorised access to data comprising;
  • a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element
  • the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form
  • the decoding means comprise at least one optical element capable of rearranging said encoded element.
  • microprocessor By employing a microprocessor to encode the element of data in accordance with a preselected algorithm and employing an optical element capable of rearranging the encoded element when displayed in visible form, it is possible to enable an authorised user to access the element of data by providing the user with an optical element.
  • optical element will depend on the particular form of the preselected algorithm.
  • microprocessor is intended to include those elements of a computer which perform the functions of a microprocessor, such as, for example, the central processing unit.
  • the element of said data comprises an alphanumeric character.
  • the element of said data is selected at random from a range of elements and comprises the password for access to the data.
  • the system further comprises input means for input of alphanumeric characters and comparator means for comparing the input with the element of said data selected at random from the data .
  • the algorithm which encodes the data will be itself held as part of the data, as would a suitable password-generating program, and a suitable comparator program.
  • the data would further comprise a set of machine readable instructions for the deletion or corruption of the data, or for the generation of a warning message for display either to the user or at some other location.
  • the display means would comprise the VDU screen in embodiments which employ a computer unit as part of the system, however it should be noted that the invention is not to be considered as limited to such embodiments and extends to other embodiments employing light-emitting diodes, liquid crystal displays, or other visual signal generating means.
  • the invention is not limited to embodiments in which the data is held in or on a magnetic form, such as on a reel of magnetic tape or a floppy or fixed disk. Therefore the invention is intended to extend to those embodiments in which data is encoded in other machine-readable forms, such as laser disks, punched tape or semiconductor arrays. Moreover some of the data may be recorded in other forms, such as photographic film materials or video tape or disk, and thus the invention extends to a system for the prevention of unauthorised access to, for example, a cable television or other diffusive system, including but not limited to systems in which at least part of the data is transmitted down fibre optic, telephone, or radio links or the like.
  • the display may be static or may scroll in a direction such that the optical element is caused to scan the encoded element. If an image is formed of the encoded element this image may in some embodiments be a real image while in others may be a virtual image.
  • the means for displaying the encoded element in visible form comprise a printing apparatus.
  • the means for displaying the encoded element of data provide labels having the encoded element of data printed thereon.
  • the manner of labelling shall not exclude the use of magnetic inks or other machine-readable printed formats.
  • the computer software required to run the label printing embodiment of the invention will differ from that in the access inhibition system described generally above. It will however still include means for transposing portions of the element of data before display, although there is not in this embodiment a requirement that the element of data so encoded is selected at random, rather the element to be encoded will be selected specifically for coding under user or system control.
  • an optical element capable of transforming a first image into a second image by the transposition of at least two portions of said first image
  • the said optical element is substantially planar and at least one optical parameter of the said optical element varies across the said plane.
  • the optical element comprises an array of light-transmissive elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
  • optical element may bring about the transposition of the elements of the encoded data by means of refraction at a surface or within a body of light-transmissive material having a varying refractive index.
  • the surface of each light-transmissive element may be flat or curved, discontinuous or continuous, and that the optics of each light-transmissive element may be axisymmetric or non-axisymmetric. magnifying or non-magnifying, polarising or non-polarising.
  • the optical element may comprise an array of light-reflective elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
  • optical element may be constructed within the definition given above. Again, it is envisaged that the surface of each element may be flat or curved, continuous or discontinuous.
  • the invention should extend to those optical elements which employ the techniques of holography.
  • a holograph as the optical element it is possible to make duplication of the element more difficult, without access to specialist equipment and therefore inhibit further unauthorised access to the data.
  • the use of a holograph allows the precise optical configuration of the optical element to be varied during manufacture, as well as enabling easy mass production of the optical elements by a suitable photographic process.
  • each said light-transmissive element comprises a prism.
  • each said light-transmissive element By employing a prism as each said light-transmissive element it is possible to manufacture the optical elements cheaply and quickly from a suitable plastics material, for example by stamping, pressing and/or moulding operations.
  • an optical element for use with the system according to the first aspect of the pres ent invent ion and capable of transf orming a f ir s t image into a second image by the transposition of at least two portions of said first image,
  • the said optical element is a substantially planar, light-transmissive body having at least one optical parameter which varies across the said plane.
  • Apparatus in accordance with the invention can be used for the protection of magnetically and optically recorded media, such as computer software or video recordings. As described above, it can also be used for decrypting printed material.
  • the system can also be used in an electro-optical system internal to a machine or robot viewing device, i.e. without human vision.
  • the light source for the device is obtained from a luminous screen or an array of light emitting devices, or in the case of printed material, natural or artificial light. Natural or artificial light would be used for liquid crystals or other non-light emitting devices.
  • Figure 1 shows decoding of a displayed symbol.
  • Figure 2 another method of decoding a differently encoded displayed symbol.
  • Figure 3 a decoding device including means for magnification.
  • Figure 4 illustrates a means of modifying the decoding device of Figure 4 in order to facilitate alignment.
  • Figure 5 shows a further means of modification to prevent cross-talk.
  • Figure 6 shows a mounting for the device of Figure 4.
  • Figure 7 shows a diagram illustrating a method of setting up a device in accordance with the invention.
  • Figure 8 shows a mounting means for a decoder device
  • Figure 9 shows a means of incorporating a decoder device into a cassette tape holder.
  • FIG. 10 is a block diagram of a data security system incorporating a device as described herein and,
  • Figure 11 illustrates one possible flow chart for a microprocessor system which embodies the present invention.
  • an encoded alphanumeric character is displayed in dot-matrix form on a screen (1).
  • the dots making up the character to be read are deviated from their correct positions by distances and in directions determined by a predetermined algorithm so that the particular character cannot be recognised.
  • Mounted before the display screen is a multi-faceted prism device (3) having facets (4) to rearrange the dot pattern to provide a decoded display or image of the display on screen (1).
  • the dot pattern may include bogus dots which are either deflected to an insignificant position or are not transmitted by the prism.
  • the mathematical mapping between the display on the screen and the image of the screen may be a one-one, many-one, many-many or one-many mapping.
  • Figure 1 vertical co lumns of dots forming the character have been deviated s ideways by various distances to alter their order .
  • the decoding pr ism ( 3 ) the angles of the prisms (4) have been calculated to deflect the vertical columns to their correct order.
  • an eye (5) sees the dot matrix rearranged to display the decoded character (6), which in this example is the English alphabetic character "R" .
  • the device is primarily intended to protect magnetically and opticaly stored data and under these conditions the algorithm for encrypting a character may be stored with the data on a suitable media.
  • figure 2 shows a system in which the dots (7) of a dot-matrix character have been deviated in vertical and horizontal directions.
  • the decoding optical element has the angles of the facets (9) calculated to correct the vertical and horizontal deviations.
  • the resultant display (10) as seen by the user when the eye is positioned behind the device has been corrected by the optical system.
  • optical elements there may be any number of optical elements in the optical path betwen the display and the viewer.
  • optical techniques separately or in combination which may be used for encrypting data are faceted optical surfaces, axisymmetri ⁇ optical systems, non-axisymmetric optical systems, refracting elements, lenses, prisms, graded index optical media and materials of differing ref ractive indices .
  • Addi tional ly the fo llowing may be employed either in combination with other techniques or in isolation; mirrors, pin holes, tubes and baffles, masks, polarisers, optical components with continuous (smooth) shapes, optical components with discontinuous shapes, fibre optics and waveguides, diffraction gratings and interference gratings or masks, holographic lens elements, and retroreflecting devices .
  • Figure 3 shows a decoding device which contains a single compound magnifying element (11).
  • An alternative is to add a magnifying element to each of the lenses within the construction. forming a lens array. These magnifying elements serve to aid vision, or to project the pattern onto a photoelectric detector.
  • Spacing arms (13) may be added to the construction (14). Any suitable shape of spacing arms may be used to obtain the correct viewing distance or spacing of the decoder device from the display screen.
  • the alignment points (19) may be identified by shape, flashing, intensity or colour.
  • the physical position of the device is correct when the specific parts of the pattern overlap at the viewing position (22).
  • Figure 8 shows how a decoder device (23) can be mounted on or built into a convenient size holder (24) to assist with the handling.
  • the holder may have printing if required to identify the lens system and may include any of the features detailed in the previous Figures.
  • Figure 9 shows how the features illustrated in Figures 4 and 8 can be combined so as to mount the optical system into the container or packing or recorded printed media.
  • the optical system (22) is built into the lid of a cassette tape holder (26).
  • the length of the lid (27) provides the correct viewing distance.
  • the optical system may be incorporated into any convenient part of a container or packing material or with a suitable fitting attached to any piece of equipment.
  • multi-faceted prisms may be used, with a plurality of facets to deflect dots in a predetermined position. This would have the advantage that the individual areas viewed are smaller than the dots of the matrix so facillitating alignment.
  • a liquid crystal mask may be used as a decoder device, such as is described in Kowel et al. (Applied Optics, 23. 16. pp. 2774-2777). This has the two advantages that it makes the device more difficult to copy fraudulently and that its optical parameters may be changed under program control.
  • FIG. 10 A complete system is depicted in Figure 10, in which an encrypted character is displayed on a display device (28).
  • the display is decoded by a decoder (29).
  • a trigger device (30) In response to the displayed character, a trigger device (30) generates a signal which is fed to a selector device (31) which permits or prevents access to further data according to the signal generated by the trigger device.
  • FIG 11 shows one possible flow chart for the operation of a computer system which embodies the present invention. It should be understood that the manner in which computer systems display information is particularly variable from machine-type to machine-type and therefore the particular details of the program to perform this function will vary considerably over a range of machines; thus a general sceme is given by way of example.
  • FIG 11a there is shown a general sceme for the flow chart of a program to be used as described herein.
  • the processor unit starts by loading a randomly or pseudo-randomly selected character into RC1, and follows this by loading a second random or pseudorandom character into RC2.
  • the processor then calls Subroutine A which displays the characters.
  • the next routine excecuted is Subroutine B which reads the keyboard. as with the display of characters the particular manner in which a machine reads the keyboard will vary. Subroutines A and B are described in more detail below.
  • the character read from the keyboard is now loaded into the register KC1 and a second keyboard reading operation is performed.
  • the second character is also loaded into a register, this time KC2.
  • the system denies access to the protected data and may in some embodiments delete or corrupt the data.
  • Figure 11b gives a subroutine for the display of characters RC1 and RC2 in encoded form.
  • the system first clears the screen and then displays a set of lens alignment points.
  • Subroutine C is then called, which displays RC1 or RC2 in an encoded form.
  • the subroutine ends at this point with a return instruction. It is important to note that the algorithm of subroutine C for encoding may be loaded into the microprocessor from the data itself.
  • Figure 11c shows a schematic of subroutine B, that is the subroutine which reads the keyboard.
  • the subroutine starts by setting a time period counter which holds a number indicative of the time since the subroutine was called.
  • the keyboard is then read; this is normally done by scanning the keyboard or reading the keyboard buffer. If there is no input then the time period counter is reduced and a check is made to see whether or not the time period counter has reached zero. If the time period has expired then the subroutine is exited with a return instruction. If the time period has not expired then the keyboard is scanned again.
  • the scanning loop is exited and a check is made as to whether or not the keyboard signal indicates that the user wishes to increase or decrease the size of the display. If a size change is reqired then subroutine A is called to erect a new display with the size factor E changed.
  • the purpose of the size changing facility is to enable the system to be used with varying sizes of monitor screens. If no size change is required then the input character is stored and the subroutine exited.
  • Figure lid shows subroutine C, which displays the encoded character.
  • the subroutine contains two nested loops the outer one of which repeats for each byte and the inner one of which repeats for each bit.
  • the display co-ordinates which are calculated are those which the algorithm states the first bit is to be transposed to, and so on for each bit.
  • the algorithm may be stored as a table of required deviation or alternatively as a matrix of suitable dimensions to transform the coordinates of the character selected for coding. In the former the algorithm is changed by altering the contents of the table.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Record Information Processing For Printing (AREA)
  • Storage Device Security (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

Système de sécurité, en particulier pour la protection de logiciels d'ordinateurs contre un accès non autorisé. Une application spécifique de la présente invention vise à inhiber l'exécution de programmes d'ordinateur tout en permettant la copie des logiciels. Une autre application spécifique de l'invention est la production de documents, labels et étiquettes codés qui ne peuvent être lus mais peuvent être copiés. L'invention comprend un système permettant d'inhiber un accès non autorisé aux données, comprenant: a) des organes de sortie (28) permettant de transposer deux ou plusieurs composants d'un élément desdites données selon un algorithme présélectionné, et de produire ainsi un élément codé; b) des organes décodeurs (29-31) servant à réorganiser l'élément codé, de manière à recréer l'élément des données. L'invention se caractérise par le fait que les organes de sortie (28) comprennent au moins un microprocesseur programmé avec ledit algorithme et un organe d'affichage sous une forme visible de l'élément codé, et que les organes de décodage comprennent au moins un élément optique (29) pouvant réorganiser l'élément codé.Security system, in particular for protecting computer software against unauthorized access. A specific application of the present invention aims to inhibit the execution of computer programs while allowing the copying of software. Another specific application of the invention is the production of coded documents, labels and labels which cannot be read but can be copied. The invention comprises a system for inhibiting unauthorized access to data, comprising: a) output devices (28) for transposing two or more components of an item of said data according to a preselected algorithm, and thereby producing an encoded item; b) decoders (29-31) for reorganizing the coded element, so as to recreate the data element. The invention is characterized in that the output devices (28) comprise at least one microprocessor programmed with said algorithm and a display device in a visible form of the coded element, and that the decoding devices comprise at least an optical element (29) capable of rearranging the coded element.

Description

SECURITY SYSTEM
This invention relates to a security system and, in one particular embodiment. to security systems for protection of computer software against unauthorised access. One specific application for this invention is to inhibit the running of computer programs whilst still permitting the software to be copied. A further specific application of the invention is in the production of encoded documents, labels and tags which cannot be read but again, can be copied
Both in industry and in commerce, there is a demand to restrict access to information. One way of doing this is to prevent unauthorised access to documents, computer tapes or other storage media. This has the disadvantage that all copying, transport and backup work has to be carried out by authorised personnel. Even with precautions being taken in this manner, it is possible that passwords and information may still be copied.
In the related field of computer software sales, especially in the mainframe micro and mini computer markets, software piracy is a large and growing problem. The needs of the vendor in preventing copying of programs conflict with the needs of the user to copy valuable software as a hedge against corruption of storage media.
In the still further related field of label production, it is often necessary to provide a label on an article which cannot be read by a potential buyer, but can be read by one offering to sell. Clearly, apparatus for reading the information should be readily portable and rapidly usable.
In a still further related field of database managment it is occasionally preferable for a host to restrict user access to specific files.
It is one object of the present invention to provide a method of storage which allows copying but restricts user access.
United States Patent 4480179 provides an apparatus for coding and/or decoding a written document comprising a plurality of fibre-optic light paths which re-arrange the relative positions of parts of the document while the document is being photocopied. The apparatus thus produces an encoded document which can be read by reversing the coding process. According to one aspect of the present invention there is provided a system to inhibit unauthorised access to data comprising;
a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element, and,
b) decoding means to rearrange said encoded element, thereby recreating the element of said data,
CHARACTERISED IN THAT, the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form, and the the decoding means comprise at least one optical element capable of rearranging said encoded element.
By employing a microprocessor to encode the element of data in accordance with a preselected algorithm and employing an optical element capable of rearranging the encoded element when displayed in visible form, it is possible to enable an authorised user to access the element of data by providing the user with an optical element. Clearly, the particular configuration of the optical element will depend on the particular form of the preselected algorithm. The term microprocessor is intended to include those elements of a computer which perform the functions of a microprocessor, such as, for example, the central processing unit.
Typically, the element of said data comprises an alphanumeric character.
By employing alphanumeric characters as the elements of the data it is possible to display a password, price tag or other quantitative or qualitative information to a user equipped with the optical element.
In a first preferred embodiment of the present invention, the element of said data is selected at random from a range of elements and comprises the password for access to the data.
By employing a range of elements from which the element of said data is selected at random it is possible to prevent a user from having future access to the data without the user possessing the optical element.
Thus. in a particular application of this first embodiment of the present invention, the system further comprises input means for input of alphanumeric characters and comparator means for comparing the input with the element of said data selected at random from the data .
By employing input and comparator means as defined above, it is possible to enable the data to be copied without consequently allowing the copied data to be accessed. Only a user who is in possession of the optical element may decode the coded element and therefore input the correct alphanumeric character or characters to access the data. It is envisaged that the invention will find a particular utility in systems which are intended to protect computer software or similar data held either in a static or dynamic memory device. In the case of computer software, a randomly or pseudo-randomly selected password is shown on the screen for the user to input. The password is however displayed in an encoded form which cannot be read until viewed through the optical element. It is envisaged that the algorithm which encodes the data will be itself held as part of the data, as would a suitable password-generating program, and a suitable comparator program. In certain embodiments the data would further comprise a set of machine readable instructions for the deletion or corruption of the data, or for the generation of a warning message for display either to the user or at some other location.
It is generally supposed that the display means would comprise the VDU screen in embodiments which employ a computer unit as part of the system, however it should be noted that the invention is not to be considered as limited to such embodiments and extends to other embodiments employing light-emitting diodes, liquid crystal displays, or other visual signal generating means.
Furthermore, the invention is not limited to embodiments in which the data is held in or on a magnetic form, such as on a reel of magnetic tape or a floppy or fixed disk. Therefore the invention is intended to extend to those embodiments in which data is encoded in other machine-readable forms, such as laser disks, punched tape or semiconductor arrays. Moreover some of the data may be recorded in other forms, such as photographic film materials or video tape or disk, and thus the invention extends to a system for the prevention of unauthorised access to, for example, a cable television or other diffusive system, including but not limited to systems in which at least part of the data is transmitted down fibre optic, telephone, or radio links or the like.
The display may be static or may scroll in a direction such that the optical element is caused to scan the encoded element. If an image is formed of the encoded element this image may in some embodiments be a real image while in others may be a virtual image.
In a second preferred embodiment of the present invention, the means for displaying the encoded element in visible form comprise a printing apparatus.
By employing a printing apparatus to display the encoded element it is possible to provide a permanent or "hard" copy of the encoded element of the data.
Thus, in a particular application of this second embodiment of the present invention, the means for displaying the encoded element of data, provide labels having the encoded element of data printed thereon.
By providing labels having encoded data printed upon them it is possible to enable articles to be marked with elements of data which cannot be read by the casual observer. It is envisaged that this particular embodiment of the invention will be useful in those areas of commerce and trade in which, for example, goods are to be labeled with data which is not for the view of potential customers but is required by sales staff.
The manner of labelling shall not exclude the use of magnetic inks or other machine-readable printed formats. Clearly, the computer software required to run the label printing embodiment of the invention will differ from that in the access inhibition system described generally above. It will however still include means for transposing portions of the element of data before display, although there is not in this embodiment a requirement that the element of data so encoded is selected at random, rather the element to be encoded will be selected specifically for coding under user or system control.
According to a second aspect of the present invention there is provided an optical element capable of transforming a first image into a second image by the transposition of at least two portions of said first image,
CHARACTERISED IN THAT, the said optical element is substantially planar and at least one optical parameter of the said optical element varies across the said plane.
By providing an optical element which is capable of transposing portions of an image and is substantially, planar it is possible to provide a readily portable means for decoding an element of data which has been encoded by the transposition of portions of the said data. Conveniently, the optical element comprises an array of light-transmissive elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
By employing a light-transmissive element is is possible to enable the optical element to be constructed in a variety of ways. For example, optical element may bring about the transposition of the elements of the encoded data by means of refraction at a surface or within a body of light-transmissive material having a varying refractive index. It is envisaged that the surface of each light-transmissive element may be flat or curved, discontinuous or continuous, and that the optics of each light-transmissive element may be axisymmetric or non-axisymmetric. magnifying or non-magnifying, polarising or non-polarising.
Alternatively, the optical element may comprise an array of light-reflective elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
Once again there is a variety of ways in which the optical element may be constructed within the definition given above. Again, it is envisaged that the surface of each element may be flat or curved, continuous or discontinuous.
In both the above embodiments it is intended that the invention should extend to those optical elements which employ the techniques of holography. By employing a holograph as the optical element it is possible to make duplication of the element more difficult, without access to specialist equipment and therefore inhibit further unauthorised access to the data. Furthermore the use of a holograph allows the precise optical configuration of the optical element to be varied during manufacture, as well as enabling easy mass production of the optical elements by a suitable photographic process.
In an embodiment of the present invention, each said light-transmissive element comprises a prism.
By employing a prism as each said light-transmissive element it is possible to manufacture the optical elements cheaply and quickly from a suitable plastics material, for example by stamping, pressing and/or moulding operations.
According to a third aspect of the present invention, there is provided an optical element for use with the system according to the first aspect of the pres ent invent ion and capable of transf orming a f ir s t image into a second image by the transposition of at least two portions of said first image,
CHARACTERISED IN THAT, the said optical element is a substantially planar, light-transmissive body having at least one optical parameter which varies across the said plane.
By employing an optical element as defined above it is possible to rearrange the encoded element of data in accordance with the predetermined algorithm and thereby to reproduce said rearranged components.
Apparatus in accordance with the invention can be used for the protection of magnetically and optically recorded media, such as computer software or video recordings. As described above, it can also be used for decrypting printed material. The system can also be used in an electro-optical system internal to a machine or robot viewing device, i.e. without human vision.
The light source for the device is obtained from a luminous screen or an array of light emitting devices, or in the case of printed material, natural or artificial light. Natural or artificial light would be used for liquid crystals or other non-light emitting devices.
The invention will now be particularly described with reference to the accompanying drawings, in which :-
Figure 1 shows decoding of a displayed symbol.
Figure 2 another method of decoding a differently encoded displayed symbol.
Figure 3 a decoding device including means for magnification.
Figure 4 illustrates a means of modifying the decoding device of Figure 4 in order to facilitate alignment.
Figure 5 shows a further means of modification to prevent cross-talk.
Figure 6 shows a mounting for the device of Figure 4.
Figure 7 shows a diagram illustrating a method of setting up a device in accordance with the invention.
Figure 8 shows a mounting means for a decoder device, Figure 9 shows a means of incorporating a decoder device into a cassette tape holder.
Figure 10 is a block diagram of a data security system incorporating a device as described herein and,
Figure 11 illustrates one possible flow chart for a microprocessor system which embodies the present invention.
Refering now to Figure 1 of the drawings, an encoded alphanumeric character is displayed in dot-matrix form on a screen (1). The dots making up the character to be read are deviated from their correct positions by distances and in directions determined by a predetermined algorithm so that the particular character cannot be recognised. Mounted before the display screen is a multi-faceted prism device (3) having facets (4) to rearrange the dot pattern to provide a decoded display or image of the display on screen (1). The dot pattern may include bogus dots which are either deflected to an insignificant position or are not transmitted by the prism. In this as in other embodiments of the present invention the mathematical mapping between the display on the screen and the image of the screen may be a one-one, many-one, many-many or one-many mapping. In the arrangement of Figure 1 vertical co lumns of dots forming the character have been deviated s ideways by various distances to alter their order .
In the decoding pr ism ( 3 ) the angles of the prisms (4) have been calculated to deflect the vertical columns to their correct order. On the viewing side of the prism, an eye (5) sees the dot matrix rearranged to display the decoded character (6), which in this example is the english alphabetic character "R" .
The device is primarily intended to protect magnetically and opticaly stored data and under these conditions the algorithm for encrypting a character may be stored with the data on a suitable media.
figure 2 shows a system in which the dots (7) of a dot-matrix character have been deviated in vertical and horizontal directions. The decoding optical element has the angles of the facets (9) calculated to correct the vertical and horizontal deviations. The resultant display (10) as seen by the user when the eye is positioned behind the device has been corrected by the optical system.
There may be any number of optical elements in the optical path betwen the display and the viewer. Examples of optical techniques separately or in combination which may be used for encrypting data are faceted optical surfaces, axisymmetriσ optical systems, non-axisymmetric optical systems, refracting elements, lenses, prisms, graded index optical media and materials of differing ref ractive indices . Addi tional ly the fo llowing may be employed either in combination with other techniques or in isolation; mirrors, pin holes, tubes and baffles, masks, polarisers, optical components with continuous (smooth) shapes, optical components with discontinuous shapes, fibre optics and waveguides, diffraction gratings and interference gratings or masks, holographic lens elements, and retroreflecting devices .
Figure 3 shows a decoding device which contains a single compound magnifying element (11). An alternative is to add a magnifying element to each of the lenses within the construction. forming a lens array. These magnifying elements serve to aid vision, or to project the pattern onto a photoelectric detector.
Spacing arms (13) (Figure 4) may be added to the construction (14). Any suitable shape of spacing arms may be used to obtain the correct viewing distance or spacing of the decoder device from the display screen.
In the embodiment of Figure 5 individual facets of a prism are each set in separate channels (15) to avoid cross-talk. Alternatively, tubes or perforated baffles may be used, or part or parts of the device darkened (16a). An optical system in accordance with the invention may be sealed into a construction by means of a clear cover as shown in figure 6.
In the arrangement of Figure 7 the correct viewing distance is found by displaying two reference points which are superimposed by means of reference facets.
The alignment points (19) may be identified by shape, flashing, intensity or colour. The physical position of the device is correct when the specific parts of the pattern overlap at the viewing position (22).
Figure 8 shows how a decoder device (23) can be mounted on or built into a convenient size holder (24) to assist with the handling. The holder may have printing if required to identify the lens system and may include any of the features detailed in the previous Figures.
Figure 9 shows how the features illustrated in Figures 4 and 8 can be combined so as to mount the optical system into the container or packing or recorded printed media. In the example shown in Figure 9 the optical system (22) is built into the lid of a cassette tape holder (26). The length of the lid (27) provides the correct viewing distance.
The optical system may be incorporated into any convenient part of a container or packing material or with a suitable fitting attached to any piece of equipment. As an alternative to single facets to deflect predetermined dots of a matrix, multi-faceted prisms may be used, with a plurality of facets to deflect dots in a predetermined position. This would have the advantage that the individual areas viewed are smaller than the dots of the matrix so facillitating alignment.
Alternatively, a liquid crystal mask may be used as a decoder device, such as is described in Kowel et al. (Applied Optics, 23. 16. pp. 2774-2777). This has the two advantages that it makes the device more difficult to copy fraudulently and that its optical parameters may be changed under program control.
A complete system is depicted in Figure 10, in which an encrypted character is displayed on a display device (28). The display is decoded by a decoder (29). In response to the displayed character, a trigger device (30) generates a signal which is fed to a selector device (31) which permits or prevents access to further data according to the signal generated by the trigger device.
Figure 11, shows one possible flow chart for the operation of a computer system which embodies the present invention. It should be understood that the manner in which computer systems display information is particularly variable from machine-type to machine-type and therefore the particular details of the program to perform this function will vary considerably over a range of machines; thus a general sceme is given by way of example.
Turning now to figure 11a. there is shown a general sceme for the flow chart of a program to be used as described herein. The processor unit starts by loading a randomly or pseudo-randomly selected character into RC1, and follows this by loading a second random or pseudorandom character into RC2. The processor then calls Subroutine A which displays the characters. The next routine excecuted is Subroutine B which reads the keyboard. as with the display of characters the particular manner in which a machine reads the keyboard will vary. Subroutines A and B are described in more detail below.
The character read from the keyboard is now loaded into the register KC1 and a second keyboard reading operation is performed. The second character is also loaded into a register, this time KC2.
The comparator now considers whether or not RC1=KC1 and RC2=KC2. If this is true, then the protected software may be run, otherwise the user is given a further chance to access the data as the program selects a further set of random characters.
Should the user fail to enter the correct figures in,for example, three sucessive attempts then the system denies access to the protected data and may in some embodiments delete or corrupt the data.
Figure 11b. gives a subroutine for the display of characters RC1 and RC2 in encoded form. The system first clears the screen and then displays a set of lens alignment points. Subroutine C is then called, which displays RC1 or RC2 in an encoded form. The subroutine ends at this point with a return instruction. It is important to note that the algorithm of subroutine C for encoding may be loaded into the microprocessor from the data itself.
Figure 11c. shows a schematic of subroutine B, that is the subroutine which reads the keyboard. The subroutine starts by setting a time period counter which holds a number indicative of the time since the subroutine was called. The keyboard is then read; this is normally done by scanning the keyboard or reading the keyboard buffer. If there is no input then the time period counter is reduced and a check is made to see whether or not the time period counter has reached zero. If the time period has expired then the subroutine is exited with a return instruction. If the time period has not expired then the keyboard is scanned again.
On input, the scanning loop is exited and a check is made as to whether or not the keyboard signal indicates that the user wishes to increase or decrease the size of the display. If a size change is reqired then subroutine A is called to erect a new display with the size factor E changed.
The purpose of the size changing facility is to enable the system to be used with varying sizes of monitor screens. If no size change is required then the input character is stored and the subroutine exited.
Figure lid. shows subroutine C, which displays the encoded character. In this example it is assumed that the particular computer in which the program is contained employs an eight by eight matrix for the display of characters. The subroutine contains two nested loops the outer one of which repeats for each byte and the inner one of which repeats for each bit.
Each bit is read in turn and, if it is true that the bit=1 then the screen co-ordinates for that bit are calculated and if necessary expanded by the factor E. In the case of the first bit, the display co-ordinates which are calculated are those which the algorithm states the first bit is to be transposed to, and so on for each bit.
The algorithm may be stored as a table of required deviation or alternatively as a matrix of suitable dimensions to transform the coordinates of the character selected for coding. In the former the algorithm is changed by altering the contents of the table.
When each bit has been checked for whether the bit=1, transposed and displayed the subroutine is exited with a return instruction.

Claims

CLAIMS :
1) A system to inhibit unauthorised access to data comprising;
a) output means to transpose two or more components of an element of said data in accordance with a preselected algorithm, and thus produce an encoded element, and,
b) decoding means to rearrange said encoded element, thereby recreating the element of said data,
CHARACTERISED IN THAT, the output means comprise at least one microprocessor programmed with said algorithm and means for displaying the encoded element in visible form, and the the decoding means comprise at least one optical element capable of rearranging said encoded element.
2) A system as claimed in claim 1, wherein the element of said data comprises an alphanumeric character.
3) A system as claimed in claim 2. wherein the element of said data is selected at random from a range of elements and comprises the password for access to the data.
4) A system as claimed in claim 3, wherein the system further comprises input means for input of alphanumeric characters and comparator means for comparing the input with the element of said data selected at random from the data.
5) A system as claimed in claim 2. wherein the means for displaying the encoded element in visible form comprise a printing apparatus.
6) A system as claimed in claim 5, wherein the means for displaying the encoded element of data, provide labels having the encoded element of data printed thereon.
7. A system as claimed in claim 1, wherein the microprocessor is arranged to be programmed with said algorithm from said data.
8) An optical element for transforming a first image into a second image by the transposition of at least two portions of said first image.
CHARACTERISED IN THAT, the said optical element is substantially planar and at least one optical parameter of the said optical element varies across the said plane. 9) An optical element as claimed in claim 8, comprising an array of light-transmissive elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
10) An optical element as claimed in claim 8, comprising an array of light-reflective elements each capable of deflecting a ray of light from a first path to a second path whereby at least two of said elements are so disposed to transpose the two portions of the first image.
11) An optical element as claimed in claim 9, wherein each said light-transmissive element comprises a prism.
12) An optical element for use with the system of claim 1, capable of transforming a first image into a second image by the transposition of at least two portions of said first image,
CHARACTERISED IN THAT, the said optical element is a substantially planar, light-transmissive body having at least one optical parameter which varies across the said plane.
EP85901505A 1984-04-04 1985-04-01 Security system Withdrawn EP0176538A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
GB8408603 1984-04-04
GB8408603 1984-04-04
GB848425017A GB8425017D0 (en) 1984-10-03 1984-10-03 Security systems
GB8425017 1984-10-03

Publications (1)

Publication Number Publication Date
EP0176538A1 true EP0176538A1 (en) 1986-04-09

Family

ID=26287554

Family Applications (1)

Application Number Title Priority Date Filing Date
EP85901505A Withdrawn EP0176538A1 (en) 1984-04-04 1985-04-01 Security system

Country Status (6)

Country Link
EP (1) EP0176538A1 (en)
AU (1) AU4154285A (en)
CA (1) CA1232080A (en)
ES (1) ES8802093A1 (en)
IL (1) IL74782A0 (en)
WO (1) WO1985004746A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH555577A (en) * 1972-06-09 1974-10-31 Gretag Ag METHOD AND DEVICE FOR CONVERTING CLEAR GRAPHICAL INFORMATION INTO ENCRYPTED GRAPHICAL INFORMATION AND REVERSE
US3814904A (en) * 1972-10-20 1974-06-04 Rca Corp Cryptographically coded cards employing synthetic light modifying portion
US3937565A (en) * 1974-06-03 1976-02-10 Alasia Alfred Victor Process of coding indicia and product produced thereby
GB2101376B (en) * 1981-07-11 1986-05-21 John Gordon Lawrence Method and apparatus for use against counterfeiting

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO8504746A1 *

Also Published As

Publication number Publication date
IL74782A0 (en) 1985-07-31
ES8802093A1 (en) 1987-01-16
ES541987A0 (en) 1987-01-16
CA1232080A (en) 1988-01-26
WO1985004746A1 (en) 1985-10-24
AU4154285A (en) 1985-11-01

Similar Documents

Publication Publication Date Title
US5032003A (en) Optially variable surface pattern
US6070160A (en) Non-linear database set searching apparatus and method
EP0611470B1 (en) Optical image encryption and decryption processes
US8127251B2 (en) Method and apparatus for a user interface with priority data
EP3075364B1 (en) Trading card and trading card set
Neisser The processes of vision
KR20010020146A (en) System and method for identifying and authenticating accessories, auxiliary agents and/or fuels for technical apparatus
CN108885301A (en) Pupil is balanced
EP1626407A2 (en) Diffractive security device on compact discs
WO2008061652A2 (en) Coding method, decoding method, codec and data storage medium for holographic storage
CA2153497A1 (en) Apparatus and method for storing data
CN106605220A (en) Method and system for selective document redaction
US5570207A (en) Holographic image identification system
EP0371787A2 (en) Decryption device
US20120262768A1 (en) Stacking a visible image and a synthetic hologram
CN102890787A (en) Constituting method of novel two-dimensional bar code
US5499116A (en) Encoded hologram for producing a machine readable image and a human readable image
CA1232080A (en) Security system
JP2010072382A (en) Diffraction grating recording medium
US10001890B2 (en) Touch tag recognizable through capacitive touch panel, information recognition method thereof and information providing method using same
US7126729B2 (en) Double hologram
JPH0651124A (en) Diffraction grating pattern consisting of volume phase type holographic grating and article having the same
JPS61501878A (en) security device
EP0185724A1 (en) An encoder/decoder
JP4249494B2 (en) Medium using information generation pattern by optical diffraction structure

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH DE FR GB IT LI LU NL SE

17P Request for examination filed

Effective date: 19860424

17Q First examination report despatched

Effective date: 19871202

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 19880413

RIN1 Information on inventor provided before grant (corrected)

Inventor name: BINGHAM, RICHARD, GEORGE